forked from pool/firejail
7ad2a2419a
* replaced --nowrap option with --wrap in firemon * The blocking action of seccomp filters has been changed from killing the process to returning EPERM to the caller. To get the previous behaviour, use --seccomp-error-action=kill or syscall:kill syntax when constructing filters, or override in /etc/firejail/firejail.config file. * Fine-grained D-Bus sandboxing with xdg-dbus-proxy. xdg-dbus-proxy must be installed, if not D-Bus access will be allowed. With this version nodbus is deprecated, in favor of dbus-user none and dbus-system none and will be removed in a future version. * DHCP client support * firecfg only fix dektop-files if started with sudo * SELinux labeling support * custom 32-bit seccomp filter support * restrict ${RUNUSER} in several profiles * blacklist shells such as bash in several profiles * whitelist globbing * mkdir and mkfile support for /run/user directory * support ignore for include * --include on the command line * splitting up media players whitelists in whitelist-players.inc * new condition: HAS_NOSOUND * new profiles: gfeeds, firefox-x11, tvbrowser, rtv, clipgrab, muraster * new profiles: gnome-passwordsafe, bibtex, gummi, latex, mupdf-x11-curl * new profiles: pdflatex, tex, wpp, wpspdf, wps, et, multimc, mupdf-x11 * new profiles: gnome-hexgl, com.github.johnfactotum.Foliate, mupdf-gl, mutool * new profiles: desktopeditors, impressive, planmaker18, planmaker18free * new profiles: presentations18, presentations18free, textmaker18, teams * new profiles: textmaker18free, xournal, gnome-screenshot, ripperX OBS-URL: https://build.opensuse.org/package/show/Virtualization/firejail?expand=0&rev=32
89 lines
2.8 KiB
RPMSpec
89 lines
2.8 KiB
RPMSpec
#
|
|
# spec file for package firejail
|
|
#
|
|
# Copyright (c) 2020 SUSE LLC
|
|
#
|
|
# All modifications and additions to the file contributed by third parties
|
|
# remain the property of their copyright owners, unless otherwise agreed
|
|
# upon. The license for this file, and modifications and additions to the
|
|
# file, is the same license as for the pristine package itself (unless the
|
|
# license for the pristine package is not an Open Source License, in which
|
|
# case the license is the MIT License). An "Open Source License" is a
|
|
# license that conforms to the Open Source Definition (Version 1.9)
|
|
# published by the Open Source Initiative.
|
|
|
|
# Please submit bugfixes or comments via https://bugs.opensuse.org/
|
|
#
|
|
|
|
|
|
Name: firejail
|
|
Version: 0.9.64
|
|
Release: 0
|
|
Summary: Linux namepaces sandbox program
|
|
License: GPL-2.0-only
|
|
Group: Productivity/Security
|
|
URL: https://firejail.wordpress.com/
|
|
Source0: http://downloads.sourceforge.net/%{name}/%{name}-%{version}.tar.xz
|
|
Source1: http://downloads.sourceforge.net/%{name}/%{name}-%{version}.tar.xz.asc
|
|
BuildRequires: fdupes
|
|
BuildRequires: gcc-c++
|
|
BuildRequires: libapparmor-devel
|
|
Requires(pre): shadow
|
|
PreReq: permissions
|
|
|
|
%description
|
|
Firejail is a SUID sandbox program that reduces the risk of security
|
|
breaches by restricting the running environment of untrusted applications
|
|
using Linux namespaces and seccomp-bpf. It includes sandbox profiles for
|
|
many existing applications like Iceweasel/Mozilla Firefox and Chromium.
|
|
|
|
Firejail also expands the restricted shell facility found in bash by adding
|
|
Linux namespace support. It supports sandboxing specific users upon login.
|
|
|
|
%prep
|
|
%setup -q
|
|
sed -i '1s/^#!\/usr\/bin\/env /#!\/usr\/bin\//' contrib/fj-mkdeb.py contrib/fjclip.py contrib/fjdisplay.py contrib/fjresize.py contrib/sort.py
|
|
|
|
%build
|
|
%configure --docdir=%{_docdir}/%{name} \
|
|
--enable-apparmor
|
|
make %{?_smp_mflags} VERBOSE=1
|
|
|
|
%pre
|
|
getent group firejail >/dev/null || groupadd -r firejail
|
|
exit 0
|
|
|
|
%install
|
|
%make_install
|
|
%fdupes -s %{buildroot}
|
|
|
|
%post
|
|
%set_permissions %{_bindir}/firejail
|
|
|
|
%verifyscript
|
|
%verify_permissions -e %{_bindir}/firejail
|
|
|
|
%files
|
|
%license COPYING
|
|
%attr(4750,root,firejail) %verify(not user group mode) %{_bindir}/firejail
|
|
%{_bindir}/firecfg
|
|
%{_bindir}/firemon
|
|
%{_datadir}/bash-completion
|
|
%{_libdir}/%{name}
|
|
%doc %{_docdir}/%{name}
|
|
%{_mandir}/man1/*
|
|
%{_mandir}/man5/*
|
|
%dir %{_sysconfdir}/%{name}
|
|
%config %{_sysconfdir}/%{name}/*
|
|
%config %{_sysconfdir}/apparmor.d/firejail-default
|
|
%config %{_sysconfdir}/apparmor.d/local/firejail-default
|
|
%dir %{_sysconfdir}/apparmor.d
|
|
%dir %{_sysconfdir}/apparmor.d/local
|
|
%dir %{_datadir}/vim/vimfiles
|
|
%dir %{_datadir}/vim/vimfiles/ftdetect
|
|
%dir %{_datadir}/vim/vimfiles/syntax
|
|
%{_datadir}/vim/vimfiles/ftdetect/firejail.vim
|
|
%{_datadir}/vim/vimfiles/syntax/firejail.vim
|
|
|
|
%changelog
|